impl
Audited by Socket on Feb 26, 2026
1 alert found:
AnomalyThe skill's functionality is coherent with its stated purpose: locating a feature plan, dispatching isolated sub-agents to execute tasks via TDD, updating state.json, and verifying files. I found no embedded network calls, credential harvesting, obfuscated code, or download-and-execute patterns in the provided specification. The primary security consideration is operational: sub-agents run project tests and implementations and are allowed to commit changes, which implies the ability to execute arbitrary repository code. If the platform provides strong sandboxing for sub-agents and requires explicit user consent for commits/pushes, the risk is low. Without such controls, there's a medium operational risk that running untrusted project code could perform harmful actions (e.g., exfiltrate data, run malicious build scripts) during test/implementation steps. Overall: no direct malicious intent in the skill text itself; moderate security risk driven by execution-of-untrusted-repo-code via sub-agents.